Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
IEEE Security and Privacy
Characteristics and responsibilities involved in a Phishing attack
WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
Software Security Analysis - Execution Phase Audit
EUROMICRO '05 Proceedings of the 31st EUROMICRO Conference on Software Engineering and Advanced Applications
Towards a structured unified process for software security
Proceedings of the 2006 international workshop on Software engineering for secure systems
Web engineering security: a practitioner's perspective
ICWE '06 Proceedings of the 6th international conference on Web engineering
On-Chip Communication Architectures: System on Chip Interconnect
On-Chip Communication Architectures: System on Chip Interconnect
Investigation of IS professionals' intention to practise secure development of applications
International Journal of Human-Computer Studies
Engineering Trust Management into Software Models
MISE '07 Proceedings of the International Workshop on Modeling in Software Engineering
A Threat Model Driven Approach for Security Testing
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
ISA: a source code static vulnerability detection system based on data fusion
Proceedings of the 2nd international conference on Scalable information systems
Secure Software Engineering: Learning from the Past to Address Future Challenges
Information Security Journal: A Global Perspective
Training ≠ education: putting secure software engineering back in the classroom
Proceedings of the 14th Western Canadian Conference on Computing Education
Impact of inheritance on vulnerability propagation at design phase
ACM SIGSOFT Software Engineering Notes
Security-oriented program transformations
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Security testing: mind the knowledge gap
ACM SIGCSE Bulletin
Review of software security defects taxonomy
RSKT'10 Proceedings of the 5th international conference on Rough set and knowledge technology
The challenge of data and application security and privacy (DASPY): are we up to it
Proceedings of the first ACM conference on Data and application security and privacy
Addressing software application security issues
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
Practical elimination of external interaction vulnerabilities in web applications
Journal of Web Engineering
Building security requirements using state transition diagram at security threat location
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Different facets of security in the cloud
Proceedings of the 15th Communications and Networking Simulation Symposium
Secure development tool adoption in open-source
Proceedings of the 2013 companion publication for conference on Systems, programming, & applications: software for humanity
Experiences by using AFFINE for building collaborative applications for online communities
OCSC'13 Proceedings of the 5th international conference on Online Communities and Social Computing
Social influences on secure development tool adoption: why security tools spread
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
Hi-index | 0.00 |
Software security is the idea of engineering software so that it continues to function correctly under malicious attack. Most technologists acknowledge this undertaking's importance, but they need some help in understanding how to tackle it. This new department aims to provide that help by exploring software security best practices.